First published: Mon Jan 04 2021(Updated: )
** DISPUTED ** Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/laminas/laminas-http | <2.14.2 | 2.14.2 |
composer/zendframework/zendframework | <=3.0.0 | |
Getlaminas Laminas-http | <2.14.2 | |
Zend Zend Framework | =3.0.0 | |
<2.14.2 | ||
=3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-3007.
The severity level of CVE-2021-3007 is critical (9.8).
The affected software packages are Laminas Project laminas-http before version 2.14.2 and Zend Framework version 3.0.0.
CVE-2021-3007 can be exploited through a deserialization vulnerability in the __destruct method of the Zend\Http\Response\Stream class in Stream.php.
To fix CVE-2021-3007, update Laminas Project laminas-http to version 2.14.2 or higher and update Zend Framework to version 3.0.1 or higher.